Blind Detection of Steganographic Content in Digital Images Using Cellular Automata
|
|
- Cori Stanley
- 5 years ago
- Views:
Transcription
1 80 Blind Detection of Steganographic Content in Digital Images Using Cellular Automata Sasan Hamidi 80.1 Introduction Motivation for Research Background on Cellular Automata Background on Digital Images and Steganography Methodology Test Results Conclusion References Introduction Steganography is the art of hiding messages or other forms of data and information within another medium. The goal of steganography is to hide the information so it can escape detection. On the other hand, steganalysis attempts to uncover such hidden messages through a variety of techniques. Many freeware and commercially available steganographic tools are currently available for hiding information in digital images (Johnson et al., 2001). Corresponding to these tools are methods devised specifically for each algorithm to detect the hidden contents. Almost all current steganalysis tools today require prior knowledge of the algorithm that was used during the steganography process; in other words, some statistical test must be performed to determine the signature associated with a particular steganographic tool or technique. Hence, by introducing new complexities and techniques, current steganalysis techniques become obsolete. The method proposed in this chapter represents a digital image in a cellular automata-based, two-dimensional array. Each cell within this two-dimensional plane is examined for anomalies presented by the process of steganography. The author believes that the technique used here is statistically more robust than other techniques presented thus far and is capable of handling complex and chaotic steganographic algorithms. 1039
2 1040 Information Security Management Handbook 80.2 Motivation for Research Current steganographic detection methods have several deficiencies: The detection method has to match the algorithm used in the steganography process. Tests must be performed to match the signature toaspecific technique used to embed the data within the medium. Slight variations in steganographic methods can render the current techniques useless. Almost all steganalysis techniques suffer from a high rate of false positives (Berg et al., 2003). To the best of the author s knowledge, to date no techniques utilize cellular automata (CA) for the detection of steganographic content in any medium. Additionally, only two methods today propose techniques to improve on the deficiencies mentioned above.the methods proposed by Berg et al. (2003) and Lyu and Farid (2002) utilize machine learning as their underlying concept. Artificial neural networks (ANNs) are a particular method for empirical learning. ANNs have proven to be equal, or superior,to other empirical learning systems over awide range of domains when evaluated in terms of their generalization ability (Cox et al., 1996; Schatten, 2005); however, although these methods have significantly improved on the areas mentioned earlier, they suffer from the following problems (Ahmad, 1988; Atlas et al., 1989; Shavlik et al., 1991; Towell and Shavlik, 1992): Training times are lengthy. The initial parameters of the network can greatly affect how well concepts are learned. No problem-independent way to choose a good network topology exists yet, although considerable research has been aimed in this direction. After training, neural networks are often very difficult to interpret. The proposed method has the advantage of being able to be applied to both index- and compressionbased images. Examples of index-based images are GIF and BMP file types, and compression-based examples are MPEG and JPEG Background on Cellular Automata The basic element of acaisthe cell. Acellisakind of amemoryelement that is capable of retaining its state. In the simplest case, each cell can have the binary states 1 or 0. In more complex simulation, the cells can have more different states. These cells are arranged in a spatial web,called a lattice.the simplest one is the one-dimensional lattice, where all cells are arranged in a line like a string. The most common CA is built in one or two dimensions. For the cells to grow, or transition from their static state to a von Neuman neighborhood Moore neighborhood Extended moore neighborhood EXHIBIT 80.1 Three different neighborhoods.
3 Blind Detection of Steganographic Content in Digital Images Using Cellular Automata 1041 dynamic one, rules must be applied. Each rule defines the state of the next step in forming new cells. Additionally, in a cellular automata lattice, the state of the next cell depends on its neighbor. Thus, the concept of neighborhood is an important one. Exhibit 80.1 shows three different neighborhoods. The distinguishing characteristic is the rules that are applied to each cell to form the lattice (Schatten, 2005) Background on Digital Images and Steganography To acomputer,an image is an array of numbers that represent light intensities at various points (pixels). These pixels make upthe raster data of the image. Acommon image size is 640! 480 pixels and 256 colors (or 8bits per pixel). Such an image could contain about 300 kilobits of data. Digital images are typically stored in either 24-bit or 8-bit files. A 24-bit image provides the most space for hiding information; however, it can be quite large (with the exception of JPEG images). All color variations for the pixels are derived from three primarycolors: red, green, and blue. Each primarycolor is represented by 1byte; 24-bit images use 3bytes per pixel to represent acolor value. These 3bytes can be represented as hexadecimal, decimal, and binary values. In many Web pages, the background color is represented by a six-digit hexadecimal number actually three pairs representing red, green, and blue. A white background would have the value FFFFFF: 100 percent red (FF), 100 percent green (FF), and 100 percent blue (FF). Its decimal value is 255, 255, 255, and its binaryvalue is , , , which are the 3 bytes making up white. Most steganography software neither supports nor recommends using JPEG images but recommends instead the use of lossless 24-bit images such as BMP. The next-best alternative to 24-bit images is 256- color or grayscale images. The most common of these found on the Internet are GIF files (Cox et al. 1996). In 8-bit color images such as GIF files, each pixel is represented as asingle byte, and each pixel merely points to acolor index table (a palette) with 256 possible colors. The value of the pixel, then, is between 0 and 255. The software simply paints the indicated color on the screen at the selected pixel position. Exhibit 80.2a, a red palette, illustrates subtle changes in color variations: visually differentiating between many of these colors is difficult. Exhibit 80.2b shows subtle color changes as well as those that seem drastic. Manysteganographyexperts recommend using images featuring 256 shades of gray (Aura, 1995). Grayscale images are preferred because the shades change very gradually from byte to byte, and the less the value changes between palette entries, the better they can hide information. EXHIBIT 80.2 Color palettes: (a) red palette; (b) color palette.
4 1042 Information Security Management Handbook Least significant bit (LSB) encoding is by far the most popular of the coding techniques used for digital images. By using the LSB of each byte (8 bits) in an image for asecret message, it is possible to store3bits of data in each pixel for 24-bit images and 1bit in each pixel for 8-bit images. Obviously, much more information can be stored in a 24-bit image file. Depending on the color palette used for the cover image (e.g., all gray), it is possible to take 2LSBs from one byte without the human visual system (HVS) being able to tell the difference. The only problem with this technique is that it is very vulnerable to attack such as image changes and formatting (e.g., changing from a GIF format to JPEG) Methodology The entire premise of the proposed method is that by introducing steganographic content the intensity of each pixel will change, and the condition of the neighboring cells can be determined by devising CA rules. Regardless of the steganographic technique, this phenomenon occurs in every instance. The detection of this change in intensity could help in the detection process. The image in this case is represented as a plane, with each pixel conceptualized as a cell in a cellular automation lattice. This method uses a technique similar to that of Adriana Popovici and Dan Popovici (Wolfram, 2002) to enhance the quality of digital images. Each cell representing each pixel in the target image is identified by its position within the plane (i, j); however, unlike the Popovici proposal, the next identifying value will be the cell s binary value of its corresponding color. Thus, each cell will have a binary value that consists of its position and the color its represents. In this proposal, each cell points to a color index table (a palette) with 256 possible colors and values between 0 and 255. As mentioned earlier, most steganographic techniques do not use JPEG images as their preferred medium because these image types are easily distorted and detection is therefore much simpler. Instead, other image types, such as BMP and GIF are used. For example, cell Acould be represented as A(0001, 0010, 1111), which means that cell A is in the first rowofthe second columnpointing to the palette of color white in an N! N plane. The proposal calls for testing all of Wolfram s 256 rules (0 to 255) to devise aset of rules to explain anormal condition for an unaltered image (Wolfram, 2002). In the plane, anormal picture (one that has not been embedded with any data) would exhibit a certain behavior (transition of cells and the neighborhood rule). The method proposes asample test of 100 pictures to determine the general CA rule that can be deduced for each image type. A similar test of 100 images that contain steganographic content is performed to come up with a similar rule for these images. Because compression and index-type images use different techniques for image creation, multiple CA rules must be developed to detect the presence of hidden data within each file type Test Results Using the Jsteg Shell steganographic tool and OutGuess, commonly used tools to embed information in JPEG files, ten pictures (from a family album) were embedded with plaintext. The original images (before steganography) and embedded ones were subjected to Wolfram s 256 rules. Initial tests have shown that rules 4and 123 exhibit similar behavior when processing the original pictures. In other words, the single most common kind of behavior exhibited by the experiment was one in which a pattern consisting of a single cell or asmall group of cells persisted. In other cases, however,such as rules 2and 103, it movedto the left or right. When processing the embedded images using the same method, an emerging common pattern could not initially be deduced. The significant finding is that, at the very least, there are observable distinguishable patterns between an original picture and one that has been embedded using Jsteg and OutGuess. Exhibit 80.3a shows the original picture in JPEG format. Exhibit 80.3b shows the same picture embedded with a Word file 24 KB in size. A distinguishable distortion in size and image quality can be observed in Exhibit 80.3b. As stated earlier, JPEG is not favorite medium of steganographic tools
5 Blind Detection of Steganographic Content in Digital Images Using Cellular Automata 1043 EXHIBIT 80.3 (a) Original versus (b) carrier picture. and algorithms; however, this file type was chosen for this initial experiment to ensure that all distortions were captured when converting the images into CA rules. Future tests must be performed on all other image types to determine their distinguishable patterns (if any) through cellular automata representation. Refinements of CA rules are also necessary in order to produce better patterns for both original and carrier images. (Carrier images are those that contain steganographic content.) 80.7 Conclusion Steganography has developed from its humble beginnings as the secret little hobby of a few bored security gurus to ahot topic of discussion at many technologyconferences. In the past threeyears, the SANS and RSA conferences, two of the most important security conferences in the United States, have featured tracts on the area of information hiding and steganography. The war on terrorism seems to have had a profound effect on the growth of steganography. It has been argued that the terrorists involved with the September 11 tragedy communicated through many convert channels, mainly through the use of steganography. A great deal of research must be performed to determine the applicability of cellular automata to the detection of steganographic content in digital images. The results of this research must be compared with many steganalysis applications and algorithms along with other proposed detection methods (Berg et al. 2003; Lyu and Farid, 2002) to determine its efficiency. Proposed improvements could be the development of a hybrid system where the capability of cellular automata could be paired with machine learning techniques to develop a robust and adaptive detection method. Automated learning and data-mining techniques are other avenues that could be pursued. There is little doubt that development in the area of covert communications and steganography will continue. Research in building morerobust methods that can survive image manipulation and attacks is ongoing. Steganalysis techniques will be useful to law enforcement authorities working in computer forensics and digital traffic analysis. The idea of asteganalysis algorithm that can learn the behavior exhibited by carrier mediums is tremendously appealing.
6 1044 Information Security Management Handbook References Ahmad, S A Study of Scaling and Generalization in Neural Networks, Tech. Rep. CCSR-88-13, University of Illinois, Center for Complex Systems Research, Urbana. Atlas, L., Cole, R., Connor, J., and El-Sharkawi, M Performance comparisons between backpropagation networks and classification trees on three real-world applications. Adv. Neural Inform. Proc.Syst., 2, Aura, T., Invisible Communication. In Proc. of EET 1995, Tech. Rep., Helsinki University of Technology, Helsinki, Finland. ( Berg,G., Davidson, I., Duan, M., and Paul. G Searching for hidden messages: automatic detection of steganography. In Proc. of the 15th AAAI Innovative Applications of Artificial Intelligence Conference, Acapulco, Mexico, August , Cox, I. et al A secure, robust watermark for multimedia. In Proc. of the First International Workshop on Information Hiding, Lecture Notes in Computer Science No. 1, pp Springer-Verlag, Berlin. Fahlman, S. E. and Lebiere, C The cascade-correlation learning architecture. Adv. Neural Inform. Process. Syst., 2, Johnson, N. F., Duric, Z., and Jajodia, S Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Kluwer Academic, Dordrecht. Kurak, C. and McHugh. J A cautionary note on image downgrading. In Proc. of the IEEE Eighth Ann. Computer Security Applications Conference, pp IEEE Press, Piscataway, NJ. Lyu, S. and Farid. H Detecting hidden messages using higher-order statistics and support vector machines. In Proc. of the Fifth International Workshop on Information Hiding, Noordwijkerhout, Netherlands, Springer-Verlag, New York. Preston, K. and Duff, M. eds Modern Cellular Automata: Theory and Applications. Plenum Press, New York. Schatten, A Cellular Automata: Digital Worlds, Shavlik, J. W., Mooney, R. J., and Towell, G. G Symbolic and neural net learning algorithms: an empirical comparison. Machine Learning, 6, Towell, G. G. and Shavlik, J. W Extracting refined rules for knowledge-based neural networks. Machine Learning, 8, Wolfram, S A New Kind of Science, pp , Wolfram Media, Champaign, IL.
A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE
Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationExploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme
Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Surbhi Gupta 1, Parvinder S. Sandhu 2 Abstract Steganography means covered writing. It is the concealment of information
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationSTEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE www.technicalpapers.co.nr ABSTRACT : Steganography is the process of hiding secret information in a cover image. Our aim is to test a set
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationA Study on Steganography to Hide Secret Message inside an Image
A Study on Steganography to Hide Secret Message inside an Image D. Seetha 1, Dr.P.Eswaran 2 1 Research Scholar, School of Computer Science and Engineering, 2 Assistant Professor, School of Computer Science
More informationBasic concepts of Digital Watermarking. Prof. Mehul S Raval
Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography
More informationImproved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2
Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationDifferent Steganography Methods and Performance Analysis
International Journal of Engineering Inventions ISSN: 2278-7461, ISBN: 2319-6491 Volume 2, Issue 1 (January 2013) PP: 37-45 Different Steganography Methods and Performance Analysis Shantala.C.P 1, K.V
More informationSTEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION
STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION SHAOHUI LIU, HONGXUN YAO, XIAOPENG FAN,WEN GAO Vilab, Computer College, Harbin Institute of Technology, Harbin, China, 150001
More informationHybrid SOFM-MLP Neural Network for Steganalysis to Detect Stego-Contents in Corporate s
Hybrid SOFM-MLP Neural Network for Steganalysis to Detect Stego-Contents in Corporate Emails Dr.Anitha Thangasami, Dr.M.I.Thariq Hussan Associate Professor, Department of Informatics, Wollega University,
More informationLSB Encoding. Technical Paper by Mark David Gan
Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.
More informationA New Steganographic Method for Palette-Based Images
A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique
More informationSteganalysis of Images Created Using Current Steganography Software
Steganalysis of Images Created Using Current Steganography Software Neil F. Johnson and Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax, Virginia 22030-4444 http://isse.gmu.edu/~csis/
More informationSteganography using LSB bit Substitution for data hiding
ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,
FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationApplication of Histogram Examination for Image Steganography
J. Appl. Environ. Biol. Sci., 5(9S)97-104, 2015 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Application of Histogram Examination
More informationInformation Hiding: Steganography & Steganalysis
Information Hiding: Steganography & Steganalysis 1 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant
More informationSteganography is the art of secret communication.
Multimedia and Security Detecting LSB Steganography in Color and Gray- Scale Images We describe a reliable and accurate method for detecting least significant bit (LSB) nonsequential embedding in digital
More informationSTEGANOGRAPHY. Sergey Grabkovsky
STEGANOGRAPHY Sergey Grabkovsky WHICH OF THESE HAS A HIDDEN MESSAGE? Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun
More informationUndercover Communication Using Image and Text as Disguise and. Countermeasures 1
Undercover Communication Using Image and Text as Disguise and Countermeasures 1 Wang Shuozhong, Chen Chao, and Zhang Xinpeng School of Communication and Information Engineering, Shanghai University Abstract:
More information<Simple LSB Steganography and LSB Steganalysis of BMP Images>
COMP 4230-201 Computer Vision Final Project, UMass Lowell Abstract This document describes a
More informationA New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari
A New Steganographic Method Based on the Run Length of the Stego-Message Eyas El-Qawasmeh and Alaa Alomari Jordan University of Science and Technology eyas@just.edu.jo Abstract. This work will propose
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationDetection of Steganography using Metadata in Jpeg Files
IJoFCS (2015) 1, 23-28 DOI: 10.5769/J201501003 or http://dx.doi.org/10.5769/j201501003 The International Journal of FORENSIC COMPUTER SCIENCE www.ijofcs.org Detection of Steganography using Metadata in
More informationImproved Detection of LSB Steganography in Grayscale Images
Improved Detection of LSB Steganography in Grayscale Images Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow at Oxford University Computing Laboratory Information Hiding Workshop
More informationA Study on Image Steganography Approaches in Digital Images
A Study on Image Steganography Approaches in Digital Images R.M. Yadav 1, Dr. Deepak Singh Tomar 2, Dr. R.K. Baghel 3 Department of CSE&IT, ECE, MANIT, Bhopal, M.P., India rmyyadav@rediffmail.com 1, deepaktomarmanit@gmail.com
More informationFundamentals of Multimedia
Fundamentals of Multimedia Lecture 2 Graphics & Image Data Representation Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Outline Black & white imags 1 bit images 8-bit gray-level images Image histogram Dithering
More informationIMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM
IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography
More informationAn Alternative Approach of Steganography using Reference Image
An Alternative Approach of Steganography using Reference Image Samir Kumar Bandyopadhyay Senior Member IEEE Dept. of Computer Science & Engineering, University of Calcutta, India Email: skb1@vsnl.com Indra
More informationSteganography is the idea of hiding private or sensitive data or information within
1.1 Introduction Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. Steganography and cryptology are similar in
More informationA Comprehensive Review on Secure Image Steganography
25 A Comprehensive Review on Secure Image Steganography Yadavindra College of Engineering, Punjabi University, Patiala kritikasingla23@gmail.com, Purbasumeet@yahoo.co.in Abstract: Steganography is an art
More informationBitmap Steganography:
Steganography: An Introduction Beau Grantham 2007 04 13 COT 4810: Topics in Computer Science Dr. Dutton I. Introduction Steganography is defined as the art and science of communicating in a way which hides
More informationData Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)
Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD) Abstract: In this paper a data hiding technique using pixel masking and message digest algorithm (DHTMMD) has been presented.
More informationA Novel Encryption System using Layered Cellular Automata
A Novel Encryption System using Layered Cellular Automata M Phani Krishna Kishore 1 S Kanthi Kiran 2 B Bangaru Bhavya 3 S Harsha Chaitanya S 4 Abstract As the technology is rapidly advancing day by day
More informationSteganalytic methods for the detection of histogram shifting data-hiding schemes
Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationImage Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image
EUROPEAN ACADEMIC RESEARCH Vol. III, Issue 1/ April 2015 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Image Compression and Decompression Technique Based on Block
More informationDESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE
DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE 1 Ram Krishna Jha, 2 Ravi Kumar Mishra 1 Dept. of Information Technology, G L Bajaj Institute of Technology
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationImage Steganography using Sudoku Puzzle for Secured Data Transmission
Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography
More informationA Proposed Technique For Hiding Data Into Video Files
www.ijcsi.org 68 A Proposed Technique For Hiding Data Into Video Files Mohamed Elbayoumy 1, Mohammed Elmogy 2, Ahmed Abouelfetouh 3 and Rasha Elhadary 4 1 Information systems department, Faculty of computer
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationImage Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator
Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator Geetha C.R. Senior lecturer, ECE Dept Sapthagiri College of Engineering Bangalore, Karnataka. ABSTRACT This paper
More informationA New Image Steganography Depending On Reference & LSB
A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationIMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationGenetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis T. R. Gopalakrishnan Nair# 1, Suma V #2, Manas S #3 1,2 Research and Industry Incubation Center, Dayananda
More informationIDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION
Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationFPGA implementation of LSB Steganography method
FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which
More informationKeywords Secret data, Host data, DWT, LSB substitution.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationELTYEB E. ABED ELGABAR
35 Evaluation of LSB Data Hiding in Various Images ELTYEB E. ABED ELGABAR Information Technology, College of Computers and Information Technology - Khulais, King Abdul Aziz University, Jeddah, Khulais,
More informationIJESRT: 7(10), October, 2018 ISSN:
IJESRT: 7(10), October, 2018 ISSN: 2277-9655 International Journal of Engineering Sciences & Research Technology (A Peer Reviewed Online Journal) Impact Factor: 5.164 IJESRT Chief Editor Dr. J.B. Helonde
More informationColored Digital Image Watermarking using the Wavelet Technique
American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,
More informationAn Improved LSB based Steganography Technique for RGB Color Images
An Improved LSB based Steganography for RGB Color Images Mamta Juneja, and Dr. Parvinder S. Sandhu Abstract This paper proposes an improved LSB(least Significant bit) based Steganography technique for
More informationA New Representation of Image Through Numbering Pixel Combinations
A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new
More informationComparative Analysis of Hybrid Algorithms in Information Hiding
Comparative Analysis of Hybrid Algorithms in Information Hiding Mrs. S. Guneswari Research Scholar PG & Research Department of Computer Science Sudharsan College of Arts & Science Pudukkottai 622 10 Tamilnadu,
More informationDigital Investigation
Digital Investigation 9 (2013) 235 245 Contents lists available at SciVerse ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin A study on the false positive rate of Stegdetect
More informationImproved Quality of Image Steganography Using POLPA
Improved Quality of Image Steganography Using POLPA T.V.S. Gowtham Prasad 1 Dr. S. Varadarajan 2 T. Ravi Kumar Naidu 3 Assistant professor, Dept. of ECE, Sreevidyaikethan Engineering College, Andhra Pradesh
More informationSterilization of Stego-images through Histogram Normalization
Sterilization of Stego-images through Histogram Normalization Goutam Paul 1 and Imon Mukherjee 2 1 Dept. of Computer Science & Engineering, Jadavpur University, Kolkata 700 032, India. Email: goutam.paul@ieee.org
More informationISSN International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 2 Web Based BPCS Steganography
Web Based BPCS Steganography Sheetal Mehta, Kaveri Dighe, Meera Jagtap, Anju Ekre Abstract The technique to hide secret information in some other data (carrier) without any apparent evidence of data exchange
More informationSSB-4 System of Steganography Using Bit 4
SSB-4 System of Steganography Using Bit 4 José Marconi Rodrigues, J.R. Rios, William Puech To cite this version: José Marconi Rodrigues, J.R. Rios, William Puech. SSB-4 System of Steganography Using Bit
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationAn Enhanced Approach in Run Length Encoding Scheme (EARLE)
An Enhanced Approach in Run Length Encoding Scheme (EARLE) A. Nagarajan, Assistant Professor, Dept of Master of Computer Applications PSNA College of Engineering &Technology Dindigul. Abstract: Image compression
More informationImage Steganography based on a Parameterized Canny Edge Detection Algorithm
Image Steganography based on a Parameterized Canny Edge Detection Algorithm Youssef Bassil LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon ABSTRACT
More informationA Steganography Algorithm for Hiding Secret Message inside Image using Random Key
A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More informationTransform Domain Technique in Image Steganography for Hiding Secret Information
Transform Domain Technique in Image Steganography for Hiding Secret Information Manibharathi. N 1 (PG Scholar) Dr.Pauls Engg. College Villupuram Dist, Tamilnadu, India- 605109 Krishnaprasad. S 2 (PG Scholar)
More informationImage Steganography with Cryptography using Multiple Key Patterns
Image Steganography with Cryptography using Multiple Key Patterns Aruna Varanasi Professor Sreenidhi Institute of Science and Technology, Hyderabad M. Lakshmi Anjana Student Sreenidhi Institute of Science
More informationGuide to Computer Forensics and Investigations Third Edition. Chapter 10 Chapter 10 Recovering Graphics Files
Guide to Computer Forensics and Investigations Third Edition Chapter 10 Chapter 10 Recovering Graphics Files Objectives Describe types of graphics file formats Explain types of data compression Explain
More informationFPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques
FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques Aniketkulkarni Sheela.c DhirajDeshpande M.Tech, TOCE Asst.Prof, TOCE Asst.prof,BKIT aniketoxc@gmail.com
More informationData Hiding Using LSB with QR Code Data Pattern Image
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Data Hiding Using LSB with QR Code Data Pattern Image D. Antony Praveen Kumar M.
More information1 Li & Drew c Prentice Hall Li & Drew c Prentice Hall 2003
Chapter 3 Graphics and Image Data Representations 3.1 Graphics/Image Data Types 3.2 Popular File Formats 3.3 Further Exploration 3.1 Graphics/Image Data Types The number of file formats used in multimedia
More informationSunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Least-Significant-Bit
More informationAN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION Sachin Mungmode, R. R. Sedamkar and Niranjan Kulkarni Department of Computer Engineering, Mumbai University,
More informationConvolutional Neural Network-based Steganalysis on Spatial Domain
Convolutional Neural Network-based Steganalysis on Spatial Domain Dong-Hyun Kim, and Hae-Yeoun Lee Abstract Steganalysis has been studied to detect the existence of hidden messages by steganography. However,
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationDigital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media
1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College
More informationA novel technique for Reversible Information Hiding
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 7 (2017) pp. 2069-2078 Research India Publications http://www.ripublication.com A novel technique for Reversible Information
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationTWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS
TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing
More informationSteganography and Steganalysis: An Overview
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Steganography
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationDigital Images: A Technical Introduction
Digital Images: A Technical Introduction Images comprise a significant portion of a multimedia application This is an introduction to what is under the technical hood that drives digital images particularly
More informationBlock Wise Data Hiding with Auxilliary Matrix
Block Wise Data Hiding with Auxilliary Matrix Jyoti Bharti Deptt. of Computer Science & Engg. MANIT Bhopal, India R.K. Pateriya Deptt. of Computer Science & Engg. MANIT Bhopal, India Sanyam Shukla Deptt.
More informationLECTURE 03 BITMAP IMAGE FORMATS
MULTIMEDIA TECHNOLOGIES LECTURE 03 BITMAP IMAGE FORMATS IMRAN IHSAN ASSISTANT PROFESSOR IMAGE FORMATS To store an image, the image is represented in a two dimensional matrix of pixels. Information about
More informationHYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING
More informationSecure Spread Spectrum Data Embedding and Extraction
Secure Spread Spectrum Data Embedding and Extraction Vaibhav Dhore 1, Pathan Md. Arfat 2 1 Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, University of Pune, India 2
More information3.1 Graphics/Image age Data Types. 3.2 Popular File Formats
Chapter 3 Graphics and Image Data Representations 3.1 Graphics/Image Data Types 3.2 Popular File Formats 3.1 Graphics/Image age Data Types The number of file formats used in multimedia continues to proliferate.
More information